SlideShare a Scribd company logo
Hacking the Airwaves
• This webinar is being recorded and an on-demand version will be available
at the same URL at the conclusion of the webinar
• Please submit questions via the button on the upper left of the viewer
• If we don’t get to your question during the webinar, we will follow up
with you via email
• Download related resources via the “Attachments” button above the
viewing panel
• On ? Join the conversation: #pineapples @HOSTINGdotcom
2
Housekeeping
3
Our speaker today:
Johan Hybinette, CISO, HOSTING
Pineapples?
4
5
6
7
8
9
10
Kali PI(es)
11
Gartner Says 6.4 Billion Connected
" " Will Be in Use in 2016, Up 30
Percent From 2015
Id IOT Hacking
12
ZigBee
Stardust
During an 18 minute flight, the
drone found nearly 1,600 Internet-
connected devices
Ref: http://thehackernews.com/2015/08/hacking-internet-of-things-drone.html
Id IOT Hacking
13
RollJam
14
RollJam
15
SDRs
16
SDRs
17
RFID Hacking
• Same passwords used everywhere
• Banking Access
• Zombies
• Phishing
• Identity Theft
• Mules
• Online Accounts
18
Why Care?
• Set your devices to not automatically connect to Wi-Fi
• Only connect to trusted sources
• PermaVPNs
• Connection alerts
19
Protect Yourself over Wi-Fi
• Watch your social media accounts
• Think! DO NOT share
• Encrypt All Data
• Never overshare on social networking sites
• Be wise about anything wireless
• Password Wallets
• Use Certificates
20
Protect Yourself Online
• Check Your Credit Regularly
• Protect your assets
• Always Ask
• Patch
• Encrypt
• Use Secure EMail
21
Protect Your Equipment
22
Q&A
For more information about technical security by HOSTING, please contact our
team at 888.894.4678.

More Related Content

PDF
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
PDF
Let's Hack a House
PDF
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
PPTX
Hume Lake Spring Marriage Retreat tech safety presentation
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PDF
IoT Attack Surfaces -- DEFCON 2015
PPTX
Dark Arts Of Social Engineering
PDF
Dorking & Pentesting with Tacyt
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Let's Hack a House
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
Hume Lake Spring Marriage Retreat tech safety presentation
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
IoT Attack Surfaces -- DEFCON 2015
Dark Arts Of Social Engineering
Dorking & Pentesting with Tacyt

What's hot (10)

PPTX
Computing on the Move - Mobile Security
PPTX
Hacking Roman Codes with Mobile Phones
PDF
Presentation: True Stories from the Threat Hunting Files
PPTX
Keeping you and your library safe and secure
PDF
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PPTX
What Symfony Has To Do With My Garage - Home Automation With PHP
PPTX
Harbin clinic iot-mobile-no-vid
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PDF
Fade from Whitehat... to Black
Computing on the Move - Mobile Security
Hacking Roman Codes with Mobile Phones
Presentation: True Stories from the Threat Hunting Files
Keeping you and your library safe and secure
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
Smart Bombs: Mobile Vulnerability and Exploitation
What Symfony Has To Do With My Garage - Home Automation With PHP
Harbin clinic iot-mobile-no-vid
Webinar On Ethical Hacking & Cybersecurity - Day2
Fade from Whitehat... to Black

Similar to Hacking Airwaves with Pineapples (20)

PDF
Social Zombies II: Your Friends Need More Brains
PDF
Fighting the next wave of sophisticated phishing attacks
PPTX
Social Engineering and Identity Theft.pptx
PDF
Cyber Raksha - by Vanshit Malhotra
PPTX
Cybercrime trends in last five years
PDF
Social and Mobile and Cloud OH MY!
PPTX
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
PPTX
Crypto Night at CSUS - Bug Bounties
PDF
Using Blockchain to Increase Supply Chain Transparency
PDF
Hacking Portugal v1.1
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Cyber security awareness presentation nepal
PPTX
Hacking By Nirmal
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
PPTX
Forensic And Cloud Computing
PDF
Securing Your Bitcoins - Kitten Tofu
PDF
The Internet of Things and You
PPTX
Social Engineering and Identity Theft
PDF
DECEPTICONv2
PDF
My InfoSec journey led me to create my own IR tools, how, and why you should too
Social Zombies II: Your Friends Need More Brains
Fighting the next wave of sophisticated phishing attacks
Social Engineering and Identity Theft.pptx
Cyber Raksha - by Vanshit Malhotra
Cybercrime trends in last five years
Social and Mobile and Cloud OH MY!
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Crypto Night at CSUS - Bug Bounties
Using Blockchain to Increase Supply Chain Transparency
Hacking Portugal v1.1
Wfh security risks - Ed Adams, President, Security Innovation
Cyber security awareness presentation nepal
Hacking By Nirmal
Pichman privacy, the dark web, & hacker devices i school (1)
Forensic And Cloud Computing
Securing Your Bitcoins - Kitten Tofu
The Internet of Things and You
Social Engineering and Identity Theft
DECEPTICONv2
My InfoSec journey led me to create my own IR tools, how, and why you should too

More from Hostway|HOSTING (20)

PPTX
Compliance-as-a-Crisis: Managing Cloud Compliance
PPTX
SQL Server 2016: Just a Few of Our DBA's Favorite Things
PPTX
KPIs: Aligning Your IT and Business Objectives
PPTX
Ransomware: Mitigation Through Preparation
PPTX
Cyber Threat Hunting with Phirelight
PPTX
5 Cloud Migration Experiences Not to Be Repeated
PPTX
Caveat Emptor: 10 Questions to Ask a Managed Service Provider Before You Sign
PPTX
Cloud Migration: Tales from the Trenches
PPTX
Protecting Against Disaster: Plan for the Inevitable Before it Happens
PPTX
Don’t Get Caught with An Out of Support MS SQL Server…
PPTX
Content Delivery in an On-Demand Age
PPTX
High Performance Security: Mitigating DDoS Attacks Without Losing Your Edge
PPTX
Finding Success with Managed Services in the Azure Environment
PPTX
DR in the Cloud: Finding the Right Tool for the Job
PPTX
Safeguarding PCI Data in the Cloud
PPTX
Understanding Your Cloud Service Provider’s BAA
PPTX
How to Spend Your Cloud Security Dollar
PPTX
Azure: Finding Success Beyond Test/Dev
PPTX
New Business Models in Behavioral Health IT
PPTX
Introducing HOSTING Labs - Ed Schaefer
Compliance-as-a-Crisis: Managing Cloud Compliance
SQL Server 2016: Just a Few of Our DBA's Favorite Things
KPIs: Aligning Your IT and Business Objectives
Ransomware: Mitigation Through Preparation
Cyber Threat Hunting with Phirelight
5 Cloud Migration Experiences Not to Be Repeated
Caveat Emptor: 10 Questions to Ask a Managed Service Provider Before You Sign
Cloud Migration: Tales from the Trenches
Protecting Against Disaster: Plan for the Inevitable Before it Happens
Don’t Get Caught with An Out of Support MS SQL Server…
Content Delivery in an On-Demand Age
High Performance Security: Mitigating DDoS Attacks Without Losing Your Edge
Finding Success with Managed Services in the Azure Environment
DR in the Cloud: Finding the Right Tool for the Job
Safeguarding PCI Data in the Cloud
Understanding Your Cloud Service Provider’s BAA
How to Spend Your Cloud Security Dollar
Azure: Finding Success Beyond Test/Dev
New Business Models in Behavioral Health IT
Introducing HOSTING Labs - Ed Schaefer

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
Spectroscopy.pptx food analysis technology
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Cloud computing and distributed systems.
Spectroscopy.pptx food analysis technology
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx

Hacking Airwaves with Pineapples

  • 2. • This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar • Please submit questions via the button on the upper left of the viewer • If we don’t get to your question during the webinar, we will follow up with you via email • Download related resources via the “Attachments” button above the viewing panel • On ? Join the conversation: #pineapples @HOSTINGdotcom 2 Housekeeping
  • 3. 3 Our speaker today: Johan Hybinette, CISO, HOSTING
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 11. 11 Gartner Says 6.4 Billion Connected " " Will Be in Use in 2016, Up 30 Percent From 2015 Id IOT Hacking
  • 12. 12 ZigBee Stardust During an 18 minute flight, the drone found nearly 1,600 Internet- connected devices Ref: http://thehackernews.com/2015/08/hacking-internet-of-things-drone.html Id IOT Hacking
  • 18. • Same passwords used everywhere • Banking Access • Zombies • Phishing • Identity Theft • Mules • Online Accounts 18 Why Care?
  • 19. • Set your devices to not automatically connect to Wi-Fi • Only connect to trusted sources • PermaVPNs • Connection alerts 19 Protect Yourself over Wi-Fi
  • 20. • Watch your social media accounts • Think! DO NOT share • Encrypt All Data • Never overshare on social networking sites • Be wise about anything wireless • Password Wallets • Use Certificates 20 Protect Yourself Online
  • 21. • Check Your Credit Regularly • Protect your assets • Always Ask • Patch • Encrypt • Use Secure EMail 21 Protect Your Equipment
  • 22. 22 Q&A For more information about technical security by HOSTING, please contact our team at 888.894.4678.